The TRIA Cyber Risk Coverage Debate Should Be Resolved as Part of its Renewal. Gregory J. May Nelson Mullins LLP Boston, MA

Size: px
Start display at page:

Download "The TRIA Cyber Risk Coverage Debate Should Be Resolved as Part of its Renewal. Gregory J. May Nelson Mullins LLP Boston, MA"

Transcription

1 The TRIA Cyber Risk Coverage Debate Should Be Resolved as Part of its Renewal By Gregory J. May Nelson Mullins LLP Boston, MA Executive Summary Lost in the commotion over whether Congress should reauthorize the Terrorism Risk Insurance Act ("TRIA") at all is the question of whether TRIA, as it is written today, does enough to protect the United States from the actual terrorist threats we now face. There is a growing danger posed by cyber terrorist attacks aimed at harming our nation's electronic infrastructure. Government officials and business leaders agree that the next terrorist attack on the United States will most likely be a cyber attack on financial, energy or other business networks designed to significantly disrupt the national economy. The fear is that any such successful attack could wipe out billions of dollars in assets and paralyze financial, energy and telecommunications systems. Like terrorism insurance, cyber insurance, which is designed specifically to cover businesses from losses arising from attacks on electronic networks and systems, is in its relative infancy. Recent data breaches have spurred many businesses to seek cyber risk coverage. The insurance industry is responding, but industry leaders admit that they do not yet have the expertise to securely underwrite cyber risks. A TRIA backstop extending to losses from cyber attacks would provide more certainty to businesses and insurers who are responsibly seeking to insure against this new and serious cyber threat. TRIA's statutory language does not explicitly state that losses resulting from cyber attacks will be covered by the TRIA backstop. Given the magnitude of the cyber threat, TRIA should be amended to confirm that losses resulting from cyber attacks will be covered without any increase in the $100 billion cap provided in the existing TRIA program. According to Government Agencies and Business Leaders, the Threat of a Catastrophic Cyber Terrorist Attack Is Very High. Department of Homeland Security ("DHS") officials, law enforcement agency heads, politicians and business leaders have recently warned that cyber attacks pose the most significant and immediate terrorist threat to the United States. While such attacks may not result in bloodshed or the physical destruction of real estate or other property, the economic effects of a well-executed attack on cyber infrastructure could result in catastrophic monetary losses and the crippling of financial, energy and transportation systems.

2 What is a "cyber attack" and how could it cause harm? Recent highly publicized cyber incidents such as the data breach at Target are considered to be pure theft of customer data to be used by the perpetrators for their own financial gain. The type of terrorist "cyber attack" feared by security agencies and experts is of a different nature and scale. Terrorists intent on harming American economic interests are believed to be planning attacks on networks maintained by financial markets and energy companies. An attack on a major bank's network could destroy financial data and thus wipe out any record of millions of account holders' assets. An attack on an electric utility's network could disable the utility's ability to manage the power grid and thus paralyze large areas of the country. Security experts believe that the risk/reward analysis will lead terrorists to pursue cyber attacks rather than the use of deadly force. The 9/11 terrorists took as much pleasure and pride in the fact that their attacks resulted in billions of dollars in financial losses as they did in the world s reaction to the horror of this staggering one event loss of life. A cyber attack on a number of financial institutions would be "cleaner" few (if any) deaths, but potentially catastrophic financial losses and disruptions of economic life that could cripple the country. Furthermore, hackers can carry out attacks from secret locations with relatively little financial cost to the terrorist operation. The Director of the Federal Bureau of Investigations, and heads of DHS and the National Counterterrorism Center told Congress in November 2013 that cyber threats are now a more serious threat to the United States than another 9/11-style attack, because "there are no safe neighborhoods. All of us are neighbors [online]." 1 Former Secretary of Defense Leon Panetta has stated that a cyber attack perpetrated by nation states or rogue violent extremists groups could be as destructive as the attack on 9/11. 2 In light of this, the Senate Intelligence Committee, with strong bipartisan support, recently recommended passage of the Cyber Information Sharing Act which would encourage companies to exchange information with the government on hacking attempts and cyber security threats. 3 The financial industry has also recognized the cyber attack threat. Major Wall Street firms (through the trade group Securities Industries and Financial Markets Association ("SIFMA") recently proposed the formation of a joint government-industry "cyber war council" to protect financial networks from cyber attacks. 4 The concern is that, because financial markets are now so dependent on the electric grid, any cyber attacks which knock down the power grid and wipe out electronic account data could cause widespread panic which could then lead to a loss of investor confidence and bank runs. Financial firms believe that the systemic consequences of an attack could be devastating for the economy. A cyber attack on a major bank could result in the bank's failure, requiring the Federal Deposit Insurance Corporation ("FDIC") to step in and cover depositors' losses. The threat of an attack has advanced well beyond the theoretical. "The Mask" cyber attack which specifically targeted domestic natural gas and oil companies was discovered in early 2014 after having gone undetected for more than five years. Security experts at Kapersky Labs described the Mask as the most sophisticated cyber threat ever seen. 5 Beginning in the fall of 2012 and lasting for weeks, hackers conducted denial-of-service ("DOS") attacks on several major bank websites which threatened those institutions' abilities to carry out day-to-day 2

3 functions during that time. Security experts believe that hackers are developing variants of the Stuxnet virus, used by the United States to disrupt the Iranian nuclear program, to in turn mount their own attack on American business interests at home and abroad. The threat of a cyber attack is not limited to the geographic area decimated by a bomb blast. Some opponents of TRIA reauthorization have suggested that the risk of a "traditional" attack is realistically limited to major political, financial and population centers of the country such as Washington, New York and Los Angeles, so that the majority of the country would not be affected and should not have to participate in reinsuring losses to those areas. A cyber attack on a financial institution operating on a nationwide basis, or a broad and concerted attack on local and regional banks across the country may not have such a limited effect, however. Such attacks could wipe out companies' assets all over the United States and affect millions of customers nationwide. Cyber Attacks Present the Insurance Industry With an Additional New Risk that It Is Still Struggling to Understand. Opponents of TRIA reauthorization argue that the insurance industry has had sufficient time since the 9/11 attacks to create risk models which should accurately gauge the threat of a terrorist attack and allow insurers and insureds to price terrorism coverage accurately. 6 However, the questions raised about TRIA s coverage of cyber terrorism have not yet been a significant part of the Congressional debate. That discussion has focused almost entirely on the more traditional property and casualty coverages for tangible "property damage" and "bodily injury," coverages that insurers, underwriters and brokers have been analyzing for many years. The "cyber" element of a cyber terrorist attack adds a large dose of uncertainty to the mix. Relative to other types of claims, insurers have very little experience with cyber-related issues. In response to the comparatively few cyber-related claims asserted over the past two decades, insurers have uniformly taken the position that their standard form general liability and property policies do not provide coverage for losses arising from cyber attacks. Beginning in the early 2000s, the insurance industry began offering separate coverage for cyber risks such as data theft and loss. Because few insurers or insureds understood the risk and potential damage caused by such losses, coverage for cyber risk insurance was limited at best for most of the last decade. Within the last few years, however, insurers and brokers have reported that demand for cybersecurity insurance coverage has skyrocketed. Highly publicized events such as the Neiman Marcus data breach in 2012, the Target data breach in 2013, and the ebay data breach in 2014 have highlighted the need for coverage specifically tailored to the threat of cyber attack and its resulting costs. The Center for Strategic and International Studies estimated in June 2014 that cyber crime now costs the global economy over $400 billion each year. 7 Insurers and brokers have looked to the new cyber risk coverage as an answer to that threat. As a result, the cyber insurance market is expected to almost double from $1 billion in gross written premiums paid last year to as much as $2 billion this year. 8 Most insurers offer 3

4 coverage that responds to claims brought against the insured by third parties allegedly damaged by an attack on the insured's networks; these claims contend that the insured is liable to the third parties because of the cybersecurity breach. Insurers generally also offer "first party" cyber coverage which applies to claims by the insured itself for losses suffered because of an attack on the insured's networks. Typical first-party policies cover costs incurred by the insured as a result of the interruption of its business caused by the breach, the costs of remediating the security flaw that led to the breach, and the costs of restoring any data or programs lost or damaged as a result of the breach. As with terrorism insurance, insurers and brokers are responding to cyber risks that are quite new and very different from the typical perils and risks that they have underwritten for decades. Insurers and brokers admit that they are having difficulty identifying and assessing cyber risks simply because they do not have the necessary experience and concomitant expertise in handling the new phenomenon of cyber attacks. Although there have been several highly publicized data breaches, the targets of those attacks have been reluctant to share information about the details of those events and the pre-breach state of their affected networks; this information would be valuable to underwriters' security experts to assess risks posed to other companies seeking cyber insurance. It appears to be the consensus among insurers and brokers that there is as yet insufficient actuarial data available upon which insurers can create risk models. Underwriters therefore may not have sufficient expertise in cyber security to price cyber risk policies accurately or to identify high-risk companies. A cyber terrorist attack of the scale feared by SIFMA or DHS could therefore cause huge economic losses that the insurance industry, despite its best efforts, has been unable to adequately address simply because it is faced with two significant new threats: cyber attacks and large-scale terrorist operations. The fledgling cyber insurance sector appears motivated to develop expertise to confront the electronic threats because (1) inaccurate underwriting could result in huge losses to the insurers; and (2) accurate underwriting will help insurers capitalize on the burgeoning cyber insurance demand. A TRIA backstop in the form of reinsurance for primary and excess cyber insurance coverage would serve the dual purpose of protecting insurers and the businesses they insure in the event of a serious terrorist attack, and encouraging insurers to enter and stay in the cyber insurance market despite all the uncertainties. TRIA's Current Language Need Not Be, But May Well Be, the Subject of an Ambiguity Debate. Some argue that TRIA does encompass coverage for cyber losses. Others assert that TRIA does not specifically address that category of loss. This needless, risky and potentially paralyzing debate should be resolved now in the TRIA reauthorization process. What are the issues to be addressed? The terms "cyber," "network," "internet," "electronic," "data," and even "computer" do not appear anywhere in the statute. One Congressional conference committee report from the 2002 TRIA enactment process indicates that certain members stated that TRIA applies to cyber events. Legislative history from the 2002, 2005 and 2007 debates about TRIA enactment and reauthorization indicates that Congress did not discuss cyber issues at all. 4

5 The question then is whether the statutory language can be read to cover cyber losses. The statute is arguably ambiguous on the issue. TRIA applies to a certified "act of terrorism" which is defined to be "a violent act or an act that is dangerous to (I) human life; (II) property; or (III) infrastructure." 9 One could argue that a cyber attack on banking networks is an attack on the financial "infrastructure" of the United States economy. Also, attacks on energy and telecommunications networks could pose dangers to "human life" through the disruption of energy, health care and law enforcement delivery systems. For example, an attack on a utility's network which results in power loss across a region might cause the deaths of infirm patients dependent on life support machinery. Because the statute does not limit "property" to "tangible property," it is also arguable that electronic data and software are "property" which could be put in danger by a cyber terrorist attack. On the other hand, it is reasonably arguable that a cyber attack on a telecommunications network which does not actually endanger human life or cause any actual damage to tangible "property" cannot be certified as an "act of terrorism" under TRIA's current language. It also could be argued that the statute applies only to physical infrastructure (such as roads and bridges), and not to intangible infrastructure such as a company's internal computer networks. Thus, thousands of companies may incur huge monetary losses as a result of business interruption directly related to widespread financial network disruption or power loss caused by a cyber attack, yet these losses may not be covered under TRIA because no danger to human life, property or infrastructure arose. TRIA also applies only to losses under "property and casualty insurance" which is defined as "commercial lines of property and casualty insurance, including excess insurance, workers' compensation insurance, and surety insurance." 10 "Property and casualty insurance" is specifically defined to exclude from TRIA's coverage crop insurance, private mortgage insurance, financial guaranty insurance, medical malpractice insurance, life or health insurance, flood insurance or reinsurance. Many types of currently available cyber coverages fall within professional liability/errors & omissions lines of coverage or directors and officers coverages, neither of which is explicitly included within TRIA. Some have also raised the issue of whether TRIA's geographic limitations will prevent it from applying to cyber attacks. TRIA applies in relevant part only to an "act of terrorism" that has been certified "to have resulted in damage within the United States." 11 "Damage" is not defined and could be interpreted broadly to apply to any "loss" incurred by businesses located in the United States, regardless of whether it is loss of intangible data or physical harm to tangible property. A cyber attack on networks maintained by foreign corporations in foreign countries which results in the loss or destruction of vital financial information could have a significant effect on American businesses and their customers such that "damage within the United States" resulted even though the terrorist activity took place abroad. The current state of affairs is that cyber coverage is arguably neither specifically included nor generally excluded from coverage under TRIA, which adds to the uncertainty surrounding this issue. Could a strong argument be made that TRIA applies to cyber losses? Some interested parties appear willing to rely on the existing statutory language for the position that TRIA covers 5

6 cyber terrorism losses. Senator Jack Reed attempted to aid this line of thinking by stating on the record during the Senate's consideration of S that cyber terrorist attacks "would continue to fall within the scope of TRIA's covered lines, as they do today." 12 Senator Reed's comments combined with the legislative record from 2002 may help a court decide that TRIA as it currently exists must be applied to losses caused by cyber terrorist attacks. However, some judges adhere to a strict "textualist" theory of statutory interpretation. Under this theory, courts should apply only the "plain language" of the statute and should not try to divine the legislature's intent by looking to legislative history or other extra-statutory sources. The mere fact that TRIA as presently written does not discuss cyber-related issues may be sufficient grounds for a textualist judge to limit's TRIA's reach, notwithstanding any comments in TRIA's legislative history declaring that the statute should be read to apply to cyber attacks. Congress Should Clarify That TRIA Applies to Cyber Attacks. The lack of any explicit reference to cyber attacks in TRIA should be at least troubling to Congress given the magnitude of the threat. As discussed above, cyber terrorism is now considered to pose the most imminent and significant terrorism risk to the United States. Should a cyber terrorist attack occur, a strict textualist court could conceivably find that TRIA does not apply to cyber terrorism at all, leaving the business and the insurance industry without any backstop whatsoever. If Congress intends that cyber attacks should fall within TRIA's ambit, it should amend TRIA to eliminate any doubt. To fully protect businesses from this most imminent threat, Congress should assure that TRIA apply to cyber attacks. Any limitation of TRIA's reach to physical losses would ignore what government and business leaders believe to be the direst risk of terrorist attack. None of the bills pending in Congress address cyber terrorism. Commentators have raised the legitimate concern that injecting cyber issues into the debate in a very partisan environment even if it is just to reemphasize that TRIA applies to cyber issues--will complicate matters given the short amount of time Congress has to consider TRIA reauthorization before the statute expires in December It should be noted here that TRIA is intended to provide a backstop only where a primary and/or umbrella insurance policy provides coverage for the loss. Whether there is coverage for damages caused by cyber attacks under standard form general commercial liability and property policies is a question still being resolved by courts. Standalone cyber insurance policies, which are only now becoming widely used, are specifically designed to cover cyber attacks. If TRIA were specifically expanded to encompass any policy type - general liability, E&O, D&O or specific peril cyber liability or first party cover--it could provide a backstop so long as it is clear that each of those policies is governed by TRIA s current make available provisions. Thereafter, TRIA cyber risk coverage would be afforded to businesses that responsibly go out and purchase coverage protecting them from the growing cyber threat. Businesses careful enough to protect themselves from cyber threats by purchasing this insurance, and their insurers that are willing to underwrite this coverage despite all of the uncertainty it poses, should be protected. The premium base that would follow would add to the industry's reserves and increase the surplus available for loss. 6

7 Interested parties have raised the valid political concern that there is little appetite in the current hyper-partisan climate to "expand" TRIA to cover cyber attacks. Applying TRIA to cyber attacks does not change the cost of the backstop, as the federal government's reimbursement to insurers for damages resulting from a certified "act of terrorism" will remain capped at $100 billion. Thus, a terrorist attack which is entirely electronic in nature will cost the Treasury no more than another 9/11-style event. Our government is now very aware of the cyber terrorist threat. Elimination of cyber vulnerabilities is a high priority of federal agencies and business interests. Electronic information networks are as critical to the operation and survival of American businesses as the brick-and-mortar buildings which are already protected under TRIA. TRIA's renewal is on the Congressional agenda this fall, and cyber coverage should be included in the debate while both issues are on everyone's minds. 1 Cyber-attacks Eclipsing Terrorism as Gravest Domestic Threat-FBI, The Guardian (11/14/2013). 2 Panetta Warns of Dire Threat of Cyberattack on U.S., New York Times (11/11/2012). 3 Senate Intelligence Panel Advances Cybersecurity Bill, Washington Post (7/8/2014) 4 Banks Dreading Computer Hacks Call for Cyber War Council, Bloomberg.com (7/8/14). 5 Kapersky Lab Uncovers "The Mask," (2/3/2014). 6 Heritage Foundation, "TRIA: Time to End the Program (Testimony of David C. John before House Subcommittee on Insurance, Housing and Community Opportunity, 9/11/2012); Robert J. Rhee, The Terrorism Risk Insurance Act: Time to End the Corporate Welfare, Policy Analysis (9/10/2013). 7 Center for Strategic and International Studies, Net Losses: Estimating the Global Cost of Cybercrime (June 2014). 8 Insurers in Dash for Expertise to Master Cyber Risk Insurance, Insurance Journal (7/14/2014). 9 TRIA, 102(1)(A). 10 TRIA, 102(12). 11 TRIA, 102(1)(A)(iii). 12 Cyberattack Questions Emerging in TRIA Reauthorization Bill Debate, Bloomberg BNA (7/18/2014). 7

BULLETIN. Number 06-B-02

BULLETIN. Number 06-B-02 North Carolina Department of Insurance Jim Long, Commissioner DATE: January 19, 2006 BULLETIN Number 06-B-02 TO: RE: ALL PROPERTY & CASUALTY INSURERS WRITING COMMERCIAL LINES INSURANCE PRODUCTS ALL INSURERS

More information

RE: President s Working Group on Financial Markets: Terrorism Risk Insurance Analysis

RE: President s Working Group on Financial Markets: Terrorism Risk Insurance Analysis September 16, 2013 Michael T. McRaith Director, Federal Insurance Office Room 1319 MT U.S. Department of the Treasury 1500 Pennsylvania Avenue, NW Washington, D.C. 20220 RE: President s Working Group on

More information

Terrorism Risk Insurance: Assessing TRIA and the Way Forward

Terrorism Risk Insurance: Assessing TRIA and the Way Forward HOMELAND SECURITY POLICY INSTITUTE Executive Brief Terrorism Risk Insurance: Assessing TRIA and the Way Forward Frank J. Cilluffo Sharon L. Cardash Josh Magarik Frank Kesterman Erwann Michel-Kerjan Ron

More information

S L tr lo a y t d egy s Cyber -Attack

S L tr lo a y t d egy s Cyber -Attack Lloyd s Cyber-Attack Strategy 02 Introduction The focus of this paper is on insurance losses arising from malicious electronic acts, referred to throughout as cyber-attack. The malicious act is the proximate

More information

June 24, Re: Solicitation for Comment on the Study and Report to Congress on Natural Catastrophes and Insurance. Dear Director McRaith:

June 24, Re: Solicitation for Comment on the Study and Report to Congress on Natural Catastrophes and Insurance. Dear Director McRaith: June 24, 2013 The Honorable Michael McRaith Director, Federal Insurance Office United States Department of the Treasury 1500 Pennsylvania Avenue, N.W. Washington D.C. 20220 Re: Solicitation for Comment

More information

The Terrorism Risk Insurance Act (TRIA): Unique Financing for a Unique Risk

The Terrorism Risk Insurance Act (TRIA): Unique Financing for a Unique Risk The Terrorism Risk Insurance Act (TRIA): Unique Financing for a Unique Risk Erwann Michel-Kerjan and Howard Kunreuther Key Points Disaster financing is a critical element of our national security. The

More information

An Overview of Cyber Insurance at AIG

An Overview of Cyber Insurance at AIG An Overview of Cyber Insurance at AIG Michael Lee, MBA Cyber Business Development Manager AIG 2018 Brittney Mishler, ARM Cyber Casualty Underwriting Specialist AIG Cyber Insurance It s a peril, not a product

More information

The Internet of Everything: Building Cyber Resilience in a Connected World

The Internet of Everything: Building Cyber Resilience in a Connected World The Internet of Everything: Building Cyber Resilience in a Connected World The Internet of Things (IoT) is everywhere, ushering in a technological revolution at lightning speed. According to an Oliver

More information

Summary of RIMS Position

Summary of RIMS Position September 16, 2013 Federal Insurance Office Attn: Kevin Meehan, Room 1319 MT United States Department of the Treasury 1500 Pennsylvania Avenue, N.W. Washington D.C. 20220 Re: President s Working Group

More information

TERRORISM INSURANCE. Treasury Needs to Collect and Analyze Data to Better Understand Fiscal Exposure and Clarify Guidance

TERRORISM INSURANCE. Treasury Needs to Collect and Analyze Data to Better Understand Fiscal Exposure and Clarify Guidance United States Government Accountability Office Report to Congressional Requesters May 2014 TERRORISM INSURANCE Treasury Needs to Collect and Analyze Data to Better Understand Fiscal Exposure and Clarify

More information

Insuring your online world, even when you re offline. Masterpiece Cyber Protection

Insuring your online world, even when you re offline. Masterpiece Cyber Protection Insuring your online world, even when you re offline Masterpiece Cyber Protection Protect your online information from being an open network 97% of Chubb clients who had a claim paid were highly satisfied

More information

CRS Report for Congress

CRS Report for Congress Order Code RS21979 Updated April 11, 2005 CRS Report for Congress Received through the CRS Web Terrorism Risk Insurance: An Overview Summary Baird Webel Analyst in Economics Government and Finance Division

More information

I. Background. TRIA, and for other purposes. See 81 Fed. Reg (Apr. 1, 2016).

I. Background. TRIA, and for other purposes. See 81 Fed. Reg (Apr. 1, 2016). I. Background Prior to September 11, 2001, most standard commercial property and casualty insurance policies did not exclude coverage for losses resulting from terrorism. The events of September 11, 2001

More information

Cyber Security Liability:

Cyber Security Liability: www.mcgrathinsurance.com Cyber Security Liability: How to protect your business from a cyber security threat or breach. 01001101011000110100011101110010011000010111010001101000001000000100100101101110011100110111

More information

DEBUNKING MYTHS FOR CYBER INSURANCE

DEBUNKING MYTHS FOR CYBER INSURANCE SESSION ID: GRC-F02 DEBUNKING MYTHS FOR CYBER INSURANCE Robert Jones Global Head of Financial Lines Specialty Claims AIG Garin Pace Cyber Product Leader AIG @Garin_Pace Introduction What Is Cyber Insurance?

More information

Property business interruption Policy wording

Property business interruption Policy wording Please read the schedule to see if your loss of income, loss of gross profit, increased costs of working or additional increased costs of working are covered or if a first loss limit or flexible business

More information

Protecting Against the High Cost of Cyberfraud

Protecting Against the High Cost of Cyberfraud Protecting Against the High Cost of Cyberfraud THE ROLE OF CYBER LIABILITY INSURANCE IN YOUR RISK MANAGEMENT STRATEGY Paying the Price...2 The Ransomware Scourge...3 Policy Provisions...3 Management Liability...4

More information

Property business interruption (technology) Policy wording

Property business interruption (technology) Policy wording Please read the schedule to see if your loss of income, loss of gross profit, increased costs of working or additional increased costs of working are covered or if a first loss limit or flexible business

More information

Cyber Risks A Reinsurer s Perspective on Exposure & Claims. EMEA Claims Conference 2018, Rüschlikon, 6th 7th March, Anthony Cordonnier

Cyber Risks A Reinsurer s Perspective on Exposure & Claims. EMEA Claims Conference 2018, Rüschlikon, 6th 7th March, Anthony Cordonnier Cyber Risks A Reinsurer s Perspective on Exposure & Claims EMEA Claims Conference 2018, Rüschlikon, 6th 7th March, Anthony Cordonnier Cyber: a claims sprint through the last year (and a bit ) Source: wikipedia.org

More information

DECLARATIONS. Limits of Liability in respect of each Occurrence and in the aggregate: Underlying Amount(s) or Each Occurrence Retention:

DECLARATIONS. Limits of Liability in respect of each Occurrence and in the aggregate: Underlying Amount(s) or Each Occurrence Retention: DECLARATIONS Item 1. Name and Address of the Named Insured: Item 2. Limits of Liability in respect of each Occurrence and in the aggregate: Item 3. Underlying Amount(s) or Each Occurrence Retention: Item

More information

NEGOTIATOR CRISIS MANAGEMENT

NEGOTIATOR CRISIS MANAGEMENT NEGOTIATOR CRISIS MANAGEMENT What will you do if a Crisis Event Occurs During Your Trip? Up to $300,000 for Crisis Management Services NEGOTIATOR CRISIS MANAGEMENT What Will You Do If a Crisis Event Occurs

More information

CYBER LIABILITY: TRENDS AND DEVELOPMENTS: WHERE WE ARE AND WHERE WE ARE GOING

CYBER LIABILITY: TRENDS AND DEVELOPMENTS: WHERE WE ARE AND WHERE WE ARE GOING CYBER LIABILITY: TRENDS AND DEVELOPMENTS: WHERE WE ARE AND WHERE WE ARE GOING 2015 Verizon Data Breach Report 79,790 security incidents 2,122 confirmed data breaches Top industries affected: Public, Information,

More information

About Chubb. Chubb Limited, the parent company of Chubb, is listed on the New York Stock Exchange (NYSE: CB) and is a component of the S&P 500 index.

About Chubb. Chubb Limited, the parent company of Chubb, is listed on the New York Stock Exchange (NYSE: CB) and is a component of the S&P 500 index. About Chubb Chubb is the world's largest publicly traded property and casualty insurer. With operations in 54 countries, Chubb provides commercial and personal property and casualty insurance, personal

More information

At the Heart of Cyber Risk Mitigation

At the Heart of Cyber Risk Mitigation At the Heart of Cyber Risk Mitigation De-risking Cyber Threats with Insurance Vikram Singh Abstract Management of risks is an integral part of the insurance industry. Companies have succeeded in identifying

More information

Statement. National Association of Mutual Insurance Companies. to the. United States House of Representatives. Committee on Financial Services

Statement. National Association of Mutual Insurance Companies. to the. United States House of Representatives. Committee on Financial Services Statement of National Association of Mutual Insurance Companies to the United States House of Representatives Committee on Financial Services Subcommittee on Housing and Insurance Hearing on : Fostering

More information

Terrorism Insurance. Port Administration and Legal Issues Seminar. 11 th July James Dover Aon Crisis Management

Terrorism Insurance. Port Administration and Legal Issues Seminar. 11 th July James Dover Aon Crisis Management Terrorism Insurance Port Administration and Legal Issues Seminar 11 th July 2005 James Dover Aon Crisis Management 0 Agenda London Attacks TRIA Terrorism Market 1 1 London Attacks Third major attack on

More information

THINKPIECE. Global terrorism insurance. Structuring global insurance programmes for terrorism and political violence. No.

THINKPIECE. Global terrorism insurance. Structuring global insurance programmes for terrorism and political violence. No. No. 19 September 2015 Global terrorism insurance Structuring global insurance programmes for terrorism and political violence THINKPIECE After more than a decade of highly visible international incidents,

More information

INSURANCE GUARANTY ASSOCIATIONS IN CONNECTICUT THE CONSUMERS SAFETY NET

INSURANCE GUARANTY ASSOCIATIONS IN CONNECTICUT THE CONSUMERS SAFETY NET INSURANCE GUARANTY ASSOCIATIONS IN CONNECTICUT THE CONSUMERS SAFETY NET Note: It is a prohibited unfair trade practice and a violation of state law for any person to make use in any manner of the existence,

More information

Overview The risk of terrorism, lone wolf style events, sabotage, war and political instability continues to grow across the globe.

Overview The risk of terrorism, lone wolf style events, sabotage, war and political instability continues to grow across the globe. War and Terrorism Overview The risk of terrorism, lone wolf style events, sabotage, war and political instability continues to grow across the globe. Liberty Specialty Markets provides market-leading War

More information

Your Guide to Business Asset Protection

Your Guide to Business Asset Protection Your Guide to Business Asset Protection Imagine finding yourself on the wrong end of a costly judgment in a lawsuit. Or re-building your business after a destructive natural disaster. Potentially worse,

More information

Terrorism Risk Insurance in Australia

Terrorism Risk Insurance in Australia Terrorism Risk Insurance in Australia Dr Christopher Wallace, Michael Pennell and Norris Robertson Australian Reinsurance Pool Corporation This presentation has been prepared for the Actuaries Institute

More information

FAQs Insurance against terrorism

FAQs Insurance against terrorism FAQs Insurance against terrorism eservices Information sheet FAQs Insurance against terrorism Contents Terrorism coverage How is terrorism defined? 2 What kinds of insurance cover claims caused by terrorism?

More information

Arkansas Insurance Department

Arkansas Insurance Department Arkansas Insurance Department Asa Hutchinson Governor Allen Kerr Commissioner BULLETIN NO. 5-2015 DATE: February 19, 2015 TO: ALL PROPERTY AND CASUALTY INSURERS WRITING COMMERCIAL LINES INSURANCE PRODUCTS

More information

Homeland Security and Your Business. Remarks. Dick Thornburgh Former Attorney General of the United States Counsel, Kirkpatrick & Lockhart LLP

Homeland Security and Your Business. Remarks. Dick Thornburgh Former Attorney General of the United States Counsel, Kirkpatrick & Lockhart LLP Homeland Security and Your Business Remarks By Dick Thornburgh Former Attorney General of the United States Counsel, Kirkpatrick & Lockhart LLP To The North-Central Regional Conference of the Risk and

More information

Insuring intangible assets: Is the insurance industry keeping pace with its customers changing requirements?

Insuring intangible assets: Is the insurance industry keeping pace with its customers changing requirements? Insuring intangible assets: Is the insurance industry keeping pace with its customers changing requirements? With developments in technology and the increasing value of intangible assets, does the insurance

More information

BULLETIN NO HOLLY C. BAKKE, COMMISSIONER

BULLETIN NO HOLLY C. BAKKE, COMMISSIONER JAMES E. MCGREEVEY Governor State of New Jersey DEPARTMENT OF BANKING AND INSURANCE OFFICE OF THE COMMISSIONER PO BOX 325 TRENTON, NJ 08625-0325 Tel (609) 292-5360 HOLLY C. BAKKE Commissioner BULLETIN

More information

Privacy and Data Breach Protection Modular application form

Privacy and Data Breach Protection Modular application form Instructions The Hiscox Technology, Privacy and Cyber Portfolio Policy may be purchased on an a-la-carte basis. Some organizations may require coverage for their technology errors and omissions, while

More information

Statement for the Record. Submitted by the. American Dental Association. Before the

Statement for the Record. Submitted by the. American Dental Association. Before the Statement for the Record Submitted by the American Dental Association Before the Subcommittee on Regulatory Reform, Commercial, and Antitrust Law Committee on the Judiciary United States House of Representatives

More information

Cyber, Data Risk and Media Insurance Application form

Cyber, Data Risk and Media Insurance Application form Instructions The Hiscox Technology, Privacy and Cyber Portfolio Policy may be purchased on an a-la-carte basis. Some organizations may require coverage for their technology errors and omissions, while

More information

Terrorism Risk & Insurance Update

Terrorism Risk & Insurance Update Terrorism Risk & Insurance Update Capitol Hill Briefing Insurance Information Institute Washington, DC April 22, 2014 Download at www.iii.org/presentations Robert P. Hartwig, Ph.D., CPCU, President & Economist

More information

What can be done to mitigate cyber risk?

What can be done to mitigate cyber risk? KEY POINTS As well as the better known hacking, cyber threats encompass a wide range of risks, the consequences of which can be severe. Banks could face regulatory sanction and may be deemed undercapitalised

More information

Cybersecurity Insurance: New Risks and New Challenges

Cybersecurity Insurance: New Risks and New Challenges SESSION ID: SDS1-F01 Cybersecurity Insurance: New Risks and New Challenges Mark Weatherford Chief Cybersecurity Strategist varmour @marktw The cybersecurity market in the Asia Pacific region contributes

More information

STEPPING INTO THE A GUIDE TO CYBER AND DATA INSURANCE BREACH

STEPPING INTO THE A GUIDE TO CYBER AND DATA INSURANCE BREACH STEPPING INTO THE A GUIDE TO CYBER AND DATA INSURANCE BREACH 2 THE CYBER AND DATA RISK TO YOUR BUSINESS This digital guide will help you find out more about the potential cyber and data risks to your business,

More information

Enhanced Cyber Risk Management Standards. Advance Notice of Proposed Rulemaking

Enhanced Cyber Risk Management Standards. Advance Notice of Proposed Rulemaking Draft 11/29/16 Enhanced Cyber Risk Management Standards Advance Notice of Proposed Rulemaking The left column in the table below sets forth the general concepts that the federal banking agencies are considering

More information

ARE INSURERS UNDERESTIMATING THE CYBERTHREAT?

ARE INSURERS UNDERESTIMATING THE CYBERTHREAT? ARE INSURERS UNDERESTIMATING THE CYBERTHREAT? AMERICANS HAVE LEARNED TO LIVE WITH BIG RISKS including, for the past few years, losses from major cyberattacks. With news of major data breaches breaking

More information

Insuring! Agreement Claim! Scenario Coverage! Response Network &! Information! Security Liability A hacker successfully obtains sensitive, personal information from the insured s computer system. As a

More information

This article has been published in PLI Current: The Journal of PLI Press, Vol. 2, No. 2, Spring 2018 ( 2018 Practising Law Institute),

This article has been published in PLI Current: The Journal of PLI Press, Vol. 2, No. 2, Spring 2018 ( 2018 Practising Law Institute), This article has been published in PLI Current: The Journal of PLI Press, Vol. 2, No. 2, Spring 2018 ( 2018 Practising Law Institute), www.pli.edu/plicurrent. PLI Current The Journal of PLI Press Vol.

More information

A GUIDE TO CYBER RISKS COVER

A GUIDE TO CYBER RISKS COVER A GUIDE TO CYBER RISKS COVER Cyber risk the daily business threat to SMEs Cyber risks and data security breaches are a daily threat to everyday business. Less than 10% of UK companies have cyber insurance

More information

Property business interruption (charity and not for profit) Policy wording

Property business interruption (charity and not for profit) Policy wording Please read the schedule to see if your loss of income, loss of gross profit, increased costs of working or additional increased costs of working are covered or if a first loss limit or flexible business

More information

Client Risk Solutions Going beyond insurance. Risk solutions for Energy. Oil, Gas and Petrochemical. Start

Client Risk Solutions Going beyond insurance. Risk solutions for Energy. Oil, Gas and Petrochemical. Start Client Risk Solutions Going beyond insurance Risk solutions for Energy Oil, Gas and Petrochemical Start Partnering to Reduce Risk AIG s Client Risk Solutions (CRS) partners with organizations to build

More information

Underwriting Bulletin

Underwriting Bulletin Underwriting Bulletin To: All Colony Contract Producers Date: January 23, 2008 Re: Revised Policyholder Notices and Endorsements Associated With the Terrorism Risk Insurance Program Reauthorization Act

More information

Cyber Risk & Insurance

Cyber Risk & Insurance Cyber Risk & Insurance Digitalization in Insurance a Threat or an Opportunity Beirut, 3 & 4 May 2017 Alexander Blom - AIG 1 Today s Cyber Presentation Cyber risks insights from an insurance perspective

More information

CYBER LIABILITY INSURANCE MARKET TRENDS: SURVEY

CYBER LIABILITY INSURANCE MARKET TRENDS: SURVEY CYBER LIABILITY INSURANCE MARKET TRENDS: SURVEY October 2015 CYBER LIABILITY INSURANCE MARKET TRENDS: SURVEY Global reinsurer PartnerRe has once again collaborated with Advisen to conduct a comprehensive

More information

Cyber-Insurance: Fraud, Waste or Abuse?

Cyber-Insurance: Fraud, Waste or Abuse? SESSION ID: STR-F03 Cyber-Insurance: Fraud, Waste or Abuse? David Nathans Director of Security SOCSoter, Inc. @Zourick Cyber Insurance overview One Size Does Not Fit All 2 Our Research Reviewed many major

More information

Add our expertise to yours Protection from the consequences of cyber risks

Add our expertise to yours Protection from the consequences of cyber risks CyberEdge THIS INFORMATION IS INTENDED FOR INSURANCE BROKERS AND OTHER INSURANCE PROFESSIONALS ONLY Add our expertise to yours Protection from the consequences of cyber risks What is CyberEdge? 2 CyberEdge

More information

Modeling the Solvency Impact of TRIA on the Workers Compensation Insurance Industry

Modeling the Solvency Impact of TRIA on the Workers Compensation Insurance Industry Modeling the Solvency Impact of TRIA on the Workers Compensation Insurance Industry Harry Shuford, Ph.D. and Jonathan Evans, FCAS, MAAA Abstract The enterprise in a rating bureau risk model is the insurance

More information

Solving Cyber Risk. Security Metrics and Insurance. Jason Christopher March 2017

Solving Cyber Risk. Security Metrics and Insurance. Jason Christopher March 2017 Solving Cyber Risk Security Metrics and Insurance Jason Christopher March 2017 How We Try to Address Cyber Risk What is Cyber Risk? Definitions Who should be concerned? Key categories of cyber risk Cyber

More information

OECD PROJECT ON CYBER RISK INSURANCE

OECD PROJECT ON CYBER RISK INSURANCE OECD PROJECT ON CYBER RISK INSURANCE April 2016 Introduction 1. Cyber risks pose a real threat to society and the economy, the recognition of which has been given increasingly wide media coverage in recent

More information

September 14, Richard F. Smith Chairman and Chief Executive Officer Equifax, Inc Peachtree Street, NE Atlanta, GA Dear Mr.

September 14, Richard F. Smith Chairman and Chief Executive Officer Equifax, Inc Peachtree Street, NE Atlanta, GA Dear Mr. September 14, 2017 Richard F. Smith Chairman and Chief Executive Officer Equifax, Inc. 1550 Peachtree Street, NE Atlanta, GA 30309 Dear Mr. Smith: Consumers Union, the policy and mobilization division

More information

Commercial Insurance

Commercial Insurance Customarq Package Commercial Insurance Barb Sandelands EVP, Package Manager, Commercial Insurance Chubb s Package approach provides flexibility to tailor insurance solutions to meet the individual needs

More information

NATIONAL TERRORISM RISK INSURANCE PROGRAMMES OF OECD COUNTRIES WITH GOVERNMENT PARTICIPATION MAIN FEATURES

NATIONAL TERRORISM RISK INSURANCE PROGRAMMES OF OECD COUNTRIES WITH GOVERNMENT PARTICIPATION MAIN FEATURES NATIONAL TERRORISM RISK INSURANCE PROGRAMMES OF OECD COUNTRIES WITH GOVERNMENT PARTICIPATION MAIN FEATURES More than two thirds of the 34 OECD Member countries currently rely on the insurance market to

More information

2018 Report on the Effectiveness of the Terrorism Risk Insurance Program. AGENCY: Departmental Offices, U.S. Department of the Treasury.

2018 Report on the Effectiveness of the Terrorism Risk Insurance Program. AGENCY: Departmental Offices, U.S. Department of the Treasury. This document is scheduled to be published in the Federal Register on 03/16/2018 and available online at https://federalregister.gov/d/2018-05433, and on FDsys.gov DEPARTMENT OF THE TREASURY 2018 Report

More information

War, Terrorism and Political Violence (WTPV) STAND SECURE AGAINST THE EVOLVING THREAT

War, Terrorism and Political Violence (WTPV) STAND SECURE AGAINST THE EVOLVING THREAT War, Terrorism and Political Violence (WTPV) STAND SECURE AGAINST THE EVOLVING THREAT THE WTPV THREAT A politically-motivated riot causes damage to a town centre forcing police to restrict access; an act

More information

The working roundtable was conducted through two interdisciplinary panel sessions:

The working roundtable was conducted through two interdisciplinary panel sessions: As advancements in technology enhance productivity, develop new businesses and enhance economic growth, malicious actors continue to advance as well, seeking to exploit technology for any number of criminal

More information

CBO Report Echoes Trustees on Medicare, Social Security

CBO Report Echoes Trustees on Medicare, Social Security ISSUE BRIEF No. 3638 CBO Report Echoes Trustees on Medicare, Social Security Romina Boccia The 2012 Congressional Budget Office (CBO) long-term budget outlook illustrates a grim picture for the nation

More information

Sizing the Standalone Commercial Cyber Insurance Market

Sizing the Standalone Commercial Cyber Insurance Market Sizing the Standalone Commercial Cyber Insurance Market Cyber liability is a risk that s rapidly permeating every business that relies on digital technology in some phase of its operations which means

More information

Insurance Requirement Provisions in Technology Contracts: Mitigating Risk, Maximizing Coverage

Insurance Requirement Provisions in Technology Contracts: Mitigating Risk, Maximizing Coverage Presenting a live 90-minute webinar with interactive Q&A Insurance Requirement Provisions in Technology Contracts: Mitigating Risk, Maximizing Coverage THURSDAY, OCTOBER 5, 2017 1pm Eastern 12pm Central

More information

OPPOSE H. R. 2874, THE 21 ST CENTURY FLOOD REFORM ACT

OPPOSE H. R. 2874, THE 21 ST CENTURY FLOOD REFORM ACT 1 November 7, 2017 OPPOSE H. R. 2874, THE 21 ST CENTURY FLOOD REFORM ACT Dear Representative, I write this letter on behalf of Consumer Federation of America (CFA) where I am the Director of Insurance.

More information

Cyber Liability A New Must Have Coverage for Your Soccer Organization

Cyber Liability A New Must Have Coverage for Your Soccer Organization Cyber Liability A New Must Have Coverage for Your Soccer Organization Presented By: Pat Pullen Jeanne Zabuska President Underwriting Manager February 17, 2012 Why do you need Cyber Liability? Have a web

More information

Small business, big risk: Lack of cyber insurance is a serious threat

Small business, big risk: Lack of cyber insurance is a serious threat Small business, big risk: Lack of cyber insurance is a serious threat October 2018 Sean Kevelighan Chief Executive Officer seank@iii.org James Lynch, FCAS, MAAA Chief Actuary jamesl@iii.org Jessica McGregor

More information

PENNSYLVANIA SURPLUS LINES ASSOCIATION MEMBER SERVICES

PENNSYLVANIA SURPLUS LINES ASSOCIATION MEMBER SERVICES Electronic Filing System Pennsylvania Surplus Lines Association Newsletter Summer 2007 PSLA Executive Director, Ken Rudert reports that the Electronic Filing System that was implemented in June, 2006 has

More information

Statement of Robert Ryan, Senior Director of Government Relations TransUnion, LLC. Before the. Subcommittee on Crime, Terrorism and Homeland Security

Statement of Robert Ryan, Senior Director of Government Relations TransUnion, LLC. Before the. Subcommittee on Crime, Terrorism and Homeland Security Statement of Robert Ryan, Senior Director of Government Relations TransUnion, LLC Before the Subcommittee on Crime, Terrorism and Homeland Security Of the Judiciary Committee HR 1731: The Identity Theft

More information

Recommendations Concerning the Terrorism Section of A.M. Best s Supplemental Rating Questionnaire. February 20, 2004

Recommendations Concerning the Terrorism Section of A.M. Best s Supplemental Rating Questionnaire. February 20, 2004 Recommendations Concerning the Terrorism Section of A.M. Best s Supplemental Rating Questionnaire February 20, 2004 INTRODUCTION A.M. Best Company s recent additions to the Supplemental Rating Questionnaire

More information

When Trouble Knocks, Will Directors and Officers Policies Answer?

When Trouble Knocks, Will Directors and Officers Policies Answer? When Trouble Knocks, Will Directors and Officers Policies Answer? Michael John Miguel Morgan Lewis & Bockius LLP Los Angeles, California The limit of liability theory lies within the imagination of the

More information

Financial Risk. Operational Risk. Strategic Risk. Compliance Risk. Chapter 2 Risk management. What is risk?

Financial Risk. Operational Risk. Strategic Risk. Compliance Risk. Chapter 2 Risk management. What is risk? Chapter 2 Risk management What is risk? Business risk is a circumstance or factor that may have a significant negative impact on the operations or profitability of a given business. Business risk can result

More information

NZI LIABILITY CYBER. Are you protected?

NZI LIABILITY CYBER. Are you protected? NZI LIABILITY CYBER Are you protected? Any business that operates online is vulnerable to cyber attacks and data breaches. From viruses and hackers to employee error and system damage, your business is

More information

Glossary of Risk Management And Insurance Terms

Glossary of Risk Management And Insurance Terms Glossary of Risk Management And Insurance Terms - 2 - Glossary of Terms ~ A ~ Act of God A natural event which causes property damage such as a hurricane, earthquake, or flood. Actual cash value The value

More information

BULLETIN All Property and Casualty Insurers Writing Commercial Lines Insurance Products

BULLETIN All Property and Casualty Insurers Writing Commercial Lines Insurance Products C.L. BUTCH OTTER Governor State of Idaho DEPARTMENT OF INSURANCE 700 West State Street, 3rd Floor P.O. Box 83720 Boise, Idaho 83720-0043 Phone (208)334-4250 Fax (208)334-4398 Website: http://www.doi.idaho.gov

More information

Terrorism Risk Insurance Legislation in the 114 th Congress: Issue Summary and Side-by-Side Analysis

Terrorism Risk Insurance Legislation in the 114 th Congress: Issue Summary and Side-by-Side Analysis Terrorism Risk Insurance Legislation in the 114 th Congress: Issue Summary and Side-by-Side Analysis Baird Webel Specialist in Financial Economics January 20, 2015 Congressional Research Service 7-5700

More information

Cybersecurity Insurance: The Catalyst We've Been Waiting For

Cybersecurity Insurance: The Catalyst We've Been Waiting For SESSION ID: CRWD-W16 Cybersecurity Insurance: The Catalyst We've Been Waiting For Mark Weatherford Chief Cybersecurity Strategist varmour @marktw Agenda Insurance challenges in the market today 10 reasons

More information

Understanding the Cyber Risk Insurance and Remediation Services Marketplace:

Understanding the Cyber Risk Insurance and Remediation Services Marketplace: Understanding the Cyber Risk Insurance and Remediation Services Marketplace: A Report on the Experiences and Opinions of Middle Market CFOs September 2010 Betterley Risk Research Insight for the Insurance

More information

DEVELOPING HOMELAND SECURITY TECHNOLOGIES:

DEVELOPING HOMELAND SECURITY TECHNOLOGIES: DEVELOPING HOMELAND SECURITY TECHNOLOGIES: Understanding and Reducing Associated Product Liability Risk (SAFETY Act and Beyond) February 26, 2008 8:00 10:30 a.m. Hilton Washington, DC/North Gaithersburg

More information

You ve been hacked. Riekie Gordon & Roger Truebody & Alexandra Schudel. Actuarial Society 2017 Convention October 2017

You ve been hacked. Riekie Gordon & Roger Truebody & Alexandra Schudel. Actuarial Society 2017 Convention October 2017 You ve been hacked Riekie Gordon & Roger Truebody & Alexandra Schudel Why should you care? U$4.6 - U$121 billion - Lloyds U$45 billion not covered 2 The plot thickens 2016 Barkly Survey: It s a business

More information

Defining the problem: the difference between current deficit and long-term deficits

Defining the problem: the difference between current deficit and long-term deficits KEY POINTS FOR FEDERAL DEFICIT DISCUSSIONS Overview: Unless our budget policies are changed, the imbalance between spending and revenues will eventually become unsustainable rapidly rising debt will threaten

More information

CYBER CRIME: THE ACHILLES HEEL OF THE BUSINESS WORLD

CYBER CRIME: THE ACHILLES HEEL OF THE BUSINESS WORLD CYBER CRIME: THE ACHILLES HEEL OF THE BUSINESS WORLD Businesses are increasingly the victims of cyber attacks. These crimes are not only costly for the companies, but can also put their very existence

More information

TRIA and Beyond: What Would Be the Most Effective Way for the Nation to Recover From (Mega)-Terrorist Attacks?

TRIA and Beyond: What Would Be the Most Effective Way for the Nation to Recover From (Mega)-Terrorist Attacks? TRIA and Beyond: What Would Be the Most Effective Way for the Nation to Recover From (Mega)-Terrorist Attacks? Extreme Events Workshop held by the Wharton Risk Management and Decision Processes Center,

More information

JAMES GRAY SPECIAL GUEST 6/7/2017. Underwriter, London UK Specialty Treaty Beazley Group

JAMES GRAY SPECIAL GUEST 6/7/2017. Underwriter, London UK Specialty Treaty Beazley Group SPECIAL GUEST JAMES GRAY Underwriter, London UK Specialty Treaty Beazley Group All 6 Beazley Lloyd's Syndicates are rated A (Excellent) by A.M. Best Admitted Carrier in the US Beazley Ins Co rated A (Excellent)

More information

Pennsylvania. Senate Banking & Insurance and Senate Environmental Resources & Energy Committees. Joint Public Hearing on Flood Insurance

Pennsylvania. Senate Banking & Insurance and Senate Environmental Resources & Energy Committees. Joint Public Hearing on Flood Insurance Pennsylvania Senate Banking & Insurance and Senate Environmental Resources & Energy Committees Joint Public Hearing on Flood Insurance January 28, 2014 Respectfully submitted by: Donald L. Griffin, CPCU,

More information

DOJ Postpones Website Accessibility Proceeding: How Businesses Can Prepare in Anticipation of a Lawsuit and How to Maximize Your Insurance Once Served

DOJ Postpones Website Accessibility Proceeding: How Businesses Can Prepare in Anticipation of a Lawsuit and How to Maximize Your Insurance Once Served DOJ Postpones Website Accessibility Proceeding: How Businesses Can Prepare in Anticipation of a Lawsuit and How to Maximize Your Insurance Once Served by Kimberly S. Reindl and Selena J. Linde The Department

More information

Cybersecurity Threats: What Retirement Plan Sponsors and Fiduciaries Need to Know and Do

Cybersecurity Threats: What Retirement Plan Sponsors and Fiduciaries Need to Know and Do ARTICLE Cybersecurity Threats: What Retirement Plan Sponsors and Fiduciaries Need to Know and Do By Gene Griggs and Saad Gul This article analyzes cybersecurity issues for retirement plans. Introduction

More information

FIDUCIARY LIABILITY Risk review performed for: Date:

FIDUCIARY LIABILITY Risk review performed for: Date: ForeFront Portfolio SM Risk Analyzer for Privately Held Companies FIDUCIARY LIABILITY Risk review performed for: Date: The Purpose of the Risk Analyzer When it comes to insuring your company, you can

More information

The Patient Protection and Affordable Care Act s (ACA s) Transitional Reinsurance Program

The Patient Protection and Affordable Care Act s (ACA s) Transitional Reinsurance Program The Patient Protection and Affordable Care Act s (ACA s) Transitional Reinsurance Program Namrata K. Uberoi Analyst in Health Care Financing Edward C. Liu Legislative Attorney November 16, 2016 Congressional

More information

Protecting SNAP and Child Nutrition From Appropriations Lapses

Protecting SNAP and Child Nutrition From Appropriations Lapses 820 First Street NE, Suite 510 Washington, DC 20002 Tel: 202-408-1080 Fax: 202-408-1056 center@cbpp.org www.cbpp.org November 9, 2015 Protecting SNAP and Child Nutrition From Appropriations Lapses By Richard

More information

Client Risk Solutions Going beyond insurance. Risk solutions for Retail. Start

Client Risk Solutions Going beyond insurance. Risk solutions for Retail. Start Client Risk Solutions Going beyond insurance Risk solutions for Retail Start Partnering to Reduce Risk Retail companies compete vigorously to deliver superior service to customers with diverse and everchanging

More information

THE SAFETY ACT WHAT IS A DESIGNATED ACT OF TERRORISM? WHAT IS PROTECTED UNDER THE SAFETY ACT?

THE SAFETY ACT WHAT IS A DESIGNATED ACT OF TERRORISM? WHAT IS PROTECTED UNDER THE SAFETY ACT? THE SAFETY ACT The SAFETY (Support Anti-terrorism by Fostering Effective Technologies) Act provides broad liability protections, caps and other legal incentives for qualified entities that sell, use, integrate,

More information

AN ACT relating to pharmacy benefit management. Be it enacted by the General Assembly of the Commonwealth of Kentucky:

AN ACT relating to pharmacy benefit management. Be it enacted by the General Assembly of the Commonwealth of Kentucky: AN ACT relating to pharmacy benefit management. Be it enacted by the General Assembly of the Commonwealth of Kentucky: Section 1. KRS 304.9-020 is amended to read as follows: As used in this subtitle:

More information

The AIR Model for Terrorism

The AIR Model for Terrorism The AIR Model for Terrorism More than a decade after 9/11, terrorism remains a highly dynamic threat capable of causing significant insurance losses. The AIR model takes a probabilistic approach to estimating

More information

The Wild West Meets the Future: Key Tips for Maximizing Your Cyber and Privacy Insurance Coverage

The Wild West Meets the Future: Key Tips for Maximizing Your Cyber and Privacy Insurance Coverage The Wild West Meets the Future: Key Tips for Maximizing Your Cyber and Privacy Insurance Coverage James P. Bobotek james.bobotek@pillsburylaw.com (202) 663-8930 Pillsbury Winthrop Shaw Pittman LLP DOCUMENT

More information

Terrorism and Cyber the fast changing landscape it is not just about privacy anymore

Terrorism and Cyber the fast changing landscape it is not just about privacy anymore Terrorism and Cyber the fast changing landscape it is not just about privacy anymore www.miller-insurance.com Terrorism - conventional exposures and responses Miller Insurance Services LLP is authorised

More information

Cyber insurance: The next frontier. Cyber insurance the next frontier

Cyber insurance: The next frontier. Cyber insurance the next frontier Cyber insurance the next frontier 1 Table of contents Summary 3 The Market Need 3 Cyber Risk: A Growing Concern 4 Rising Cost of Cyber Crime 5 Impact by Industry 6 Cyber Risk and Insurance 7 Cyber Risk

More information